词条 | Alice and Bob |
释义 |
}}{{For|the 1969 film|Bob & Carol & Ted & Alice}} Alice and Bob are fictional characters commonly used as placeholder names in cryptology, as well as science and engineering literature. The Alice and Bob characters were invented by Ron Rivest, Adi Shamir, and Leonard Adleman in their 1978 paper "A method for obtaining digital signatures and public-key cryptosystems."[1] Subsequently, they have become common archetypes in many scientific and engineering fields, such as quantum cryptography, game theory and physics.[2] As the use of Alice and Bob became more popular, additional characters were added, each with a particular meaning. These characters do not have to refer to humans; they refer to generic agents which might be different computers or even different programs running on a single computer. OverviewAlice and Bob are the names of fictional characters used for convenience and to aid comprehension. For example, "How can Bob send a private message M to Alice in a public-key cryptosystem?"[1] is believed to be easier to describe and understand than "How can B send a private message M to A in a public-key cryptosystem?" In cryptography and computer security, Alice and Bob are used extensively as participants in discussions about cryptographic protocols or systems. The names are conventional, and other than Alice and Bob often use a rhyming mnemonic to associate the name with the typical role of that person. HistoryThe first mention of Alice and Bob in the context of cryptography was in Rivest, Shamir, and Adleman's 1978 article "A method for obtaining digital signatures and public-key cryptosystems."[1] They wrote, "For our scenarios we suppose that A and B (also known as Alice and Bob) are two users of a public-key cryptosystem" (p. 121).[1] Previous to this article, cryptographers typically referred to message senders and receivers as A and B, or other simple symbols. In fact, in the two previous articles by Rivest, Shamir, and Adleman, introducing the RSA cryptosystem, there is no mention of Alice and Bob.[3][4] Within a few years, however, reference to Alice and Bob in cryptological literature became a common trope. Cryptographers would often begin their academic papers with reference to Alice and Bob. For instance, Michael Rabin began his 1981 paper, "Bob and Alice each have a secret, SB and SA, respectively, which they want to exchange."[5] Early on, Alice and Bob were starting to appear in other domains, such as in Manuel Blum's 1981 article, "Coin Flipping by Telephone: A Protocol for Solving Impossible Problems," which begins, "Alice and Bob want to flip a coin by telephone."[6] Although Alice and Bob were invented with no reference to their personality, authors soon began adding colorful descriptions. In 1983, Blum invented a backstory about a troubled relationship between Alice and Bob, writing, "Alice and Bob, recently divorced, mutually distrustful, still do business together. They live on opposite coasts, communicate mainly by telephone, and use their computers to transact business over the telephone."[7] In 1984, John Gordon delivered his famous{{to whom|date=August 2018}} "After Dinner Speech" about Alice and Bob, which he imagines to be the first "definitive biography of Alice and Bob."[8] In addition to adding backstories and personalities to Alice and Bob, authors soon added other characters, with their own personalities. The first to be added was Eve, the "eavesdropper." Eve was invented in 1988 by Charles Bennet, Gilles Brassard, and Jean-Marc Robert, in their paper, "Privacy Amplification by Public Discussion."[9] In Bruce Schneier's book Applied Cryptography, other characters are listed.[10] Cast of charactersThe most common characters are Alice and Bob. Eve, Mallory, and Trent are also common names, and have fairly well-established "personalities" (or functions). The names often use rhyming mnemonics (for example, Eve, "eavesdropper"; Mallory, "malicious"). Other names are much less common, and flexible in use.
For interactive proof systems there are other characters:
PhysicsThe names Alice and Bob are also often used to name the participants in thought experiments in physics.[20][21] See also
References1. ^1 2 3 {{Cite journal|last=Rivest|first=R. L.|last2=Shamir|first2=A.|last3=Adleman|first3=L.|date=1978-02-01|title=A Method for Obtaining Digital Signatures and Public-key Cryptosystems|journal=Commun. ACM|volume=21|issue=2|pages=120–126|doi=10.1145/359340.359342|issn=0001-0782|citeseerx=10.1.1.607.2677}} , p. 44: "Mallet can intercept Alice's database inquiry, and substitute his own public key for Alice's. He can do the same to Bob."[22][23][24][25]2. ^{{cite book|last=Newton|first=David E.|title=Encyclopedia of Cryptography|year=1997|publisher=Instructional Horizons, Inc|location=Santa Barbara California|pages=10}} 3. ^Rivest, R. L., A. Shamir, and L. Adleman. “On Digital Signatures and Public-Key Cryptosystems.” Cambridge MA: Massachusetts Institute of Technology, April 1977. 4. ^Rivest, R. L., A. Shamir, and L. Adleman. Cryptographic Communications System and Method. 4405829. Cambridge MA, filed December 14, 1977, and issued September 20, 1983. 5. ^Rabin, Michael O. How to exchange secrets with oblivious transfer. Technical Report TR-81, Aiken Computation Lab, Harvard University, 1981. 6. ^Blum, Manuel. “Coin Flipping by Telephone a Protocol for Solving Impossible Problems.” ACM SIGACT News 15, no. 1 (November 10, 1981): 23–27. 7. ^Blum, Manuel. “How to Exchange (Secret) Keys.” ACM Trans. Comput. Syst. 1, no. 2 (May 1983): 175–193. {{doi|10.1145/357360.357368}}. 8. ^Gordon, John. “The Alice and Bob After Dinner Speech.” Zurich, April 1984. http://downlode.org/Etext/alicebob.html. 9. ^Bennett, Charles H., Gilles Brassard, and Jean-Marc Robert. “Privacy Amplification by Public Discussion.” SIAM Journal on Computing 17, no. 2 (April 1988): 210–29. {{doi|10.1137/0217014}}. 10. ^Schneier, Bruce. Applied Cryptography: Protocols, Algorithms and Source Code in C. Hoboken, NJ: John Wiley & Sons, 2015. 11. ^{{citation |last=Tanenbaum|first=Andrew S. | title=Distributed Systems: Principles and Paradigms | isbn=978-0-13-239227-3 | publisher=Pearson Prentice Hall] | year=2007 | url=https://books.google.com/books?id=DL8ZAQAAIAAJ | page=171;399–402 }} 12. ^{{Cite journal|last=Fried|first=Joshua|last2=Gaudry|first2=Pierrick|last3=Heninger|first3=Nadia|author3-link= Nadia Heninger |last4=Thomé|first4=Emmanuel|title=A kilobit hidden SNFS discrete logarithm computation|url=https://eprint.iacr.org/2016/961.pdf|journal=University of Pennsylvania and INRIA, CNRS, University of Lorraine|volume=|access-date=2016-10-12}} 13. ^{{Cite journal|last=Grigg|first=Ian|title=Ivan The Honourable|url=http://iang.org/rants/ivan_the_honourable.html}} 14. ^{{Cite journal|last=Szabo|first=Nick|date=September 1997|title=Formalizing and Securing Relationships on Public Networks|url=http://firstmonday.org/ojs/index.php/fm/article/view/548/469|journal=First Monday|volume=2|pages=}} 15. ^{{Citation|last=Schneier|title=Bruce Schneier - Who are Alice & Bob?|date=2010-09-23|url=https://www.youtube.com/watch?v=BuUSi_QvFLY|accessdate=2017-05-02}} 16. ^{{cite journal|year=1992|title=Algebraic Methods for Interactive Proof Systems|journal=J. ACM|volume=39|issue=4|pages=859–868|doi=10.1145/146585.146605|author=Carsten Lund|display-authors=etal|citeseerx=10.1.1.41.9477}} 17. ^{{citation |doi=10.1017/S0963548300000080 |last1=Spencer|first1=Joel|author1-link=Joel Spencer | last2=Winkler|first2=Peter|author2-link=Peter Winkler | title=Three Thresholds for a Liar | url=http://math.dartmouth.edu/~pw/papers/3thresh.ps | journal=Combinatorics, Probability and Computing | year=1992 | volume=1 |issue=1 | pages=81–93}} 18. ^{{citation |last=Muthukrishnan|first=S. | title=Data Streams: Algorithms and Applications | isbn=978-1-933019-14-7 | publisher=Now Publishers | year=2005 | url=http://algo.research.googlepages.com/eight.ps | page=3}} 19. ^{{Cite book|title = On Numbers and Games|last = Conway|first = John Horton|publisher = CRC Press|year = 2000|isbn = 9781568811277|location = |pages = 71, 175, 176}} 20. ^{{Cite web|url=http://physicsworld.com/cws/article/news/2013/apr/16/alice-and-bob-communicate-without-transferring-a-single-photon|title=Alice and Bob communicate without transferring a single photon - physicsworld.com|website=physicsworld.com|language=en-GB|access-date=2017-06-19}} 21. ^{{Cite journal|last=Frazier|first=Matthew|last2=Taddese|first2=Biniyam|last3=Antonsen|first3=Thomas|last4=Anlage|first4=Steven M.|date=2013-02-07|title=Nonlinear Time Reversal in a Wave Chaotic System|journal=Physical Review Letters|language=en-US|volume=110|issue=6|pages=063902|doi=10.1103/physrevlett.110.063902|pmid=23432243|arxiv=1207.1667|bibcode=2013PhRvL.110f3902F}} 22. ^1 2 Bruce Schneier (1996), Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Wiley, {{ISBN|9780471117094}}, p. 23: Table 2.1: Dramatis Personae 23. ^1 Charles L. Perkins et al. (2000), Firewalls: 24seven, Network Press, {{ISBN|9780782125290}}, p. 130: "Mallet maintains the illusion that Alice and Bob are talking to each other rather than to him by intercepting the messages and retransmitting them." 24. ^1 Brian LaMacchia (2002), .NET Framework Security, Addison-Wesley, {{ISBN|9780672321849}}, p. 616: "Mallet represents an active adversary that not only listens to all communications between Alice and Bob but can also modify the contents of any communication he sees while it is in transit." 25. ^1 Shlomi Dolev, ed. (2009), Algorithmic Aspects of Wireless Sensor Networks, Springer, {{ISBN|9783642054334}}, p. 67: "We model key choices of Alice, Bob and adversary Mallet as independent random variables A, B and M [...]" }} External links
3 : Cryptographic protocols|Placeholder names|Thought experiments in physics |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。